Information
For more information about our classifieds, please check following links.
About Terms Privacy
Welcome to clickooz.com! Sign In Are you new to our site? Register now
1 photo

Description

       
Get fully solved assignment. Buy online from website
Get MCA5042 SMU Spring 2018 SEM 5 Solved Assignment At Nominal Price
www.smuassignment.in
online store
or

plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate

Charges rs 125/subject

if urgent then call us on 08791490301, 08273413412

DRIVE
SPRING 2018
PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
5

SUBJECT CODE & NAME

MCA5042- Cryptography and Network Security

1 a) List and explain the objectives of computer security.
b) What is the difference between passive and active security threats?
Answer: a) Objectives of Computer Security
Confidentiality
The first objective of security is confidentiality: keeping information away from people who should
not have it. Accomplishing this objective requires that we know what data we are protecting and
who should have access to it. It requires that we provide protection mechanisms for the data while
it is

2 a) What is avalanche effect?
b) Explain data encryption standard (DES).
Answer: a) In cryptography, the avalanche effect is the desirable property of cryptographic
algorithms, typically block ciphers and cryptographic hash functions wherein if when an input is
changed slightly (for example, flipping a single bit) the output changes significantly (e.g., half the
output bits flip). In the case of high-quality block ciphers, such a small change in either the key or
the plaintext should cause

3 Explain the evaluation criteria for Advanced Encryption Standard (AES).

Answer: The AES is likely to be the commercial-grade symmetric algorithm of choice for years, if
not decades. In January 1997, NIST called for cryptographers to develop a new encryption system.
As with the call

4 a) What is key distribution?
b) Explain symmetric key distribution using symmetric encryption.
Answer: a) In symmetric key cryptography, both parties must possess a secret key which they must
exchange prior to using any encryption. Distribution of secret keys has been problematic until
recently, because it

5 a) Describe the four types of protocol of SSL.
b) What is Transport Layer Security (TLS)? Explain.
Answer: a) The SSL defines four protocols in two layers. They are:Change CipherSpec Protocol
The change CipherSpec protocol is responsible for sending change CipherSpec messages. At any
time, the client can request to change current cryptographic parameters such as the handshake key
exchange.

6 a) Discuss intrusion detection.
b) What do you mean by malicious software? Explain in detail.
Answer: a) Intrusion detection:
Closely related to audit reduction is the ability to detect security lapses, ideally while they occur. As
we have seen in the State Department example, there may well be too much information in the
audit log for a human to analyze, but

Get fully solved assignment. Buy online from website

www.smuassignment.in
online store
or

plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate

Charges rs 125/subject

if urgent then call us on 08791490301, 08273413412        

Comments Add new

Add new comment
No comments added yet. Be first to leave comment!

Seller's info

Seller's picture
Private person
Registered on April 5, 2018

Listing location

India, Delhi, New Delhi

Seller's email address

Close
.
- you cannot copy & paste mail, you need to rewrite it
- do not send spam
- ask only questions related to this product
- do not be rude
Hello! Sign in to get more.
Home Search My account My alerts My personal info My listings Mail us
Refine search
Keyword
Category
Location

Region

City

Pictures
Price

Price:

-
Advanced
Clean search